US7844862B1 - Detecting software race conditions - Google Patents

Detecting software race conditions Download PDF

Info

Publication number
US7844862B1
US7844862B1 US11/716,545 US71654507A US7844862B1 US 7844862 B1 US7844862 B1 US 7844862B1 US 71654507 A US71654507 A US 71654507A US 7844862 B1 US7844862 B1 US 7844862B1
Authority
US
United States
Prior art keywords
memory
identifier
recited
memory address
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US11/716,545
Inventor
Daniel Dwight Grove
Ivan Posva
Jack H. Choquette
Cliff N. Click, Jr.
Jeffrey Gee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Azul Systems Inc
Original Assignee
Azul Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Azul Systems Inc filed Critical Azul Systems Inc
Priority to US11/716,545 priority Critical patent/US7844862B1/en
Assigned to AZUL SYSTEMS, INC. reassignment AZUL SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHOQUETTE, JACK H., CLICK, CLIFF N. JR., GROVE, DANIEL DWIGHT, POSVA, IVAN, GEE, JEFFREY
Priority to US12/910,761 priority patent/US8230271B2/en
Application granted granted Critical
Publication of US7844862B1 publication Critical patent/US7844862B1/en
Assigned to SILICON VALLEY BANK reassignment SILICON VALLEY BANK SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AZUL SYSTEMS, INC.
Assigned to PARTNERS FOR GROWTH IV, L.P. reassignment PARTNERS FOR GROWTH IV, L.P. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AZUL SYSTEMS, INC.
Assigned to AZUL SYSTEMS, INC. reassignment AZUL SYSTEMS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: PARTNERS FOR GROWTH IV, L.P.
Assigned to AZUL SYSTEMS, INC. reassignment AZUL SYSTEMS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: SILICON VALLEY BANK
Assigned to GOLUB CAPITAL LLC, AS COLLATERAL AGENT reassignment GOLUB CAPITAL LLC, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AZUL SYSTEMS, INC.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging

Definitions

  • parallel processors can enforce strict memory models of in-order execution of stores and loads.
  • memory models are becoming weaker as systems with large numbers of memory-coherent processors are becoming common.
  • memory ordering operations such as barrier instructions must be used by a programmer and/or a compiler and/or some other form of code generator. It is easy for programmers and compilers to accidentally omit these memory ordering operations even though a race condition is not desired. This can lead to unpredictable and incorrect program execution. Therefore, there exists a need for a better way to determine whether a desired memory ordering operation has been omitted.
  • FIG. 1 is a flowchart illustrating an embodiment of performing a store operation.
  • FIG. 2 is a flowchart illustrating an embodiment of a process for tracking information associated with a store operation.
  • FIG. 3 is a flowchart illustrating an embodiment of a process for performing a load operation.
  • FIG. 4 is a flowchart illustrating an embodiment of a process for detecting a potential race condition.
  • FIG. 5 is flowchart illustrating an embodiment of a process for performing an ordering operation.
  • the invention can be implemented in numerous ways, including as a process, an apparatus, a system, a composition of matter, a computer readable medium such as a computer readable storage medium or a computer network wherein program instructions are sent over optical or communication links.
  • these implementations, or any other form that the invention may take, may be referred to as techniques.
  • a component such as a processor or a memory described as being configured to perform a task includes both a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task.
  • the order of the steps of disclosed processes may be altered within the scope of the invention.
  • Detecting a memory race condition in a multi-processor environment is disclosed.
  • the processors are simulated processors.
  • memory store operations, memory load operations, and/or ordering operations that order memory operations are monitored to detect potential memory race conditions. For example, if a memory location that has been previously stored by a previous store operation is used in a subsequent store and/or load operation without an associated ordering operation, a race condition is detected.
  • detecting a potential memory race condition includes performing one or more of the following: running the program in a software multi-processor simulator, trapping store and/or load instructions of the program, and replacing store and/or load instructions of the program with other/additional instructions for memory race condition detection.
  • a memory store operation of a program when a memory store operation of a program is performed, data associated with the store operation is tracked and a check is performed to determine whether the store operation is associated with a potential memory race condition. In some embodiments, when a memory load operation of a program is performed, a check is performed to determine whether the load operation is associated with a potential memory race condition. In some embodiments, when an ordering operation is performed, a race condition detection processing is performed to update/remove tracked information associated with one or more previous store operations. Examples of the ordering operation includes a fence operation, a barrier operation, and a compare and swap operation.
  • FIG. 1 is a flowchart illustrating an embodiment of performing a store operation.
  • the process of FIG. 1 is performed when a request for a store operation is received. For example, a processor instruction to store a value to memory is executed and/or compiled.
  • a store operation is performed. Performing the store operation includes storing a value to a specified memory and/or storage location.
  • performing the store operation includes performing a simulated store operation using a processor/system simulator.
  • performing the store operation includes trapping and/or replacing the store operation.
  • a check is performed to determine whether the store operation is associated with a potential race condition. Checking for the potential race condition includes using information tracked about one or more previous store operations.
  • An example of a detected potential race condition includes detecting a store by a processor to a memory location previously stored to by another processor without performing an associated memory ordering operation. If at 106 it determined a race condition is detected, at 108 , the race condition is logged. In some embodiments, logging the race condition includes displaying and/or storing information associated with the detected race condition. For example, a memory location, a processor identifier, and/or a program location/identifier (e.g., a stack location, a program counter, and a function name) is logged to allow a programmer to view, identify, and correct any undesired race conditions. If at 106 it determined a race condition is not detected, at 110 , data associated with the store operation is tracked. The tracked data is used in performing a subsequent race condition detection. For example, a memory address, a storage location address, a program location/identifier, and/or a processor identifier are indexed for use in race condition detection.
  • FIG. 2 is a flowchart illustrating an embodiment of a process for tracking information associated with a store operation.
  • the process of FIG. 2 is included in 110 of FIG. 1 .
  • an identifier of a destination memory address of the store operation and a identifier of a program location associated with the store operation are stored in a race condition detection queue. Storing the program location is optional.
  • a separate race condition detection queue is associated with each processor of a plurality of associated processors, and the memory address identifier and the program location are stored in the respective queue of the processor performing the store operation.
  • the processors are simulated processors.
  • the race detection queue is a circular queue and/or fixed in size to allow efficient storage and searching.
  • the queue is merely an example.
  • a data structure other than a queue is associated with each processor and the data structure can be used to store the identifiers of the destination address and the program location.
  • the program location includes one or more of the following: a stack location, a stack trace, a program counter, a function name, and any identifier that can be used identify a location within a program.
  • Other data associated with the store operation can be stored in the queue.
  • storing data in the race condition detection queue is optional. For example, individual data structures associated with each processor is not used and only a global data structure associated with all of the processors is used to track store operations.
  • a memory address identifier and a processor identifier are stored in a global hash table. Storing the processor identifier is optional.
  • the global hash table is accessible by a plurality of processors for tracking store operations across the plurality of processors.
  • the memory address identifier and the processor identifier are associated together in the hash table.
  • the memory address identifier is stored in the hash table together with an associated generation number.
  • Other data associated with the store instruction can be stored in the hash table.
  • storing data in the global hash table is optional. For example, only data structures privately associated with each processor is used to track store operations.
  • the hash table is an unlocked hash table that allows fast accesses.
  • the hash table can be used to determine whether to search race condition detection queues and/or which race condition detection queues to search.
  • FIG. 3 is a flowchart illustrating an embodiment of a process for performing a load operation.
  • the process of FIG. 3 is performed when a request for a load operation is received.
  • a check is performed to determine whether a potential race condition is associated with the load operation is to be performed. For example, information about previous store operations is searched to determine whether a store operation to the memory address to be loaded has been performed since the last ordering operation by a processor other than the processor performing the load.
  • the race condition is logged. In some embodiments, logging the race condition includes displaying and/or storing information associated with the detected race condition.
  • a memory location, a processor identifier, and/or a program location is logged to allow a programmer to view, identify, and correct any undesired race conditions.
  • the load operation is performed. Performing the load operation includes loading a value from memory at a specified memory address. For example, a load processor instruction is performed. In some embodiments, performing the load operation includes performing a simulated load operation. For example, memory is loaded from a simulated memory address of a simulator. In some embodiments, performing the load operation includes trapping and/or replacing the load operation.
  • FIG. 4 is a flowchart illustrating an embodiment of a process for detecting a potential race condition.
  • the process of FIG. 4 is included in 104 of FIG. 1 .
  • the process of FIG. 4 is included in 302 of FIG. 3 .
  • an identifier of a memory address associated with a memory operation is looked up in a global hash table. Examples of the memory address include a store address of a memory store operation, and a load address of a memory load operation.
  • the global hash table can be accessed by a plurality of associated processors.
  • the hash table is the hash table of 204 in FIG. 2 .
  • memory address identifiers in the global hash table indicate memory addresses that have been previously been stored to and consequently can be associated with a potential race condition.
  • the memory address identifier is found in the global hash table, at 406 it determined whether a processor identifier stored with the memory address identifier in the hash table is associated with a processor that is not the processor performing the memory operation. If the processor identifier is associated with the processor performing the memory operation, at 414 it is concluded that no race condition is detected. Otherwise, at 408 it is determined whether the memory address identifier is found in a race condition detection buffer of a processor identified using the processor identifier. In some embodiments, the race condition detection buffer is the buffer in 204 of FIG. 2 . Finding the memory address identifier in the buffer includes searching entries of the buffer for the memory address identifier. If the memory address identifier is not found, at 414 it is concluded that no race condition is detected.
  • 410 it is determined whether the memory operation using the memory address is associated with a benign race condition.
  • one or more predetermined criteria for a benign race condition is specified for one or more program applications. For example, a memory address that is always associated with benign race condition is specified for a program. If a benign race condition is detected, at 414 it is concluded that no race condition is detected. Otherwise, at 412 it concluded a race condition is detected.
  • both a global hash table and a race detection queue of a processor have been used in determining whether a race condition is detected.
  • using the race condition detection queue is optional. For example, only the global hash table is searched to determine whether a race condition is detected. In some embodiments, using the global hash table is optional. For example, rather than searching the global hash table, individual race condition detection queues are searched to determine whether a race condition is detected.
  • FIG. 5 is flowchart illustrating an embodiment of a process for performing an ordering operation.
  • the process of FIG. 5 is performed when a request for an ordering operation is received.
  • an operation ordering memory operations is performed.
  • the ordering operation orders memory operations such that one or more store operations occurring before the ordering operation is visible to other processors before any memory operation occurring after the ordering operation. For example, a store fence operation is performed.
  • performing the ordering operation includes performing a simulated ordering operation in a simulator.
  • performing the ordering operation includes trapping and/or replacing the ordering operation.
  • a race condition detection operation associated with the ordering operation is performed. Tracking data that tracks memory addresses modified by a processor is reset and/or updated to reflect the memory ordering operation.
  • entries in a race condition detection buffer of the processor are removed and/or entries in a global hash table associated with the processor are removed.
  • the buffer is the buffer in 202 of FIG. 2 and the hash table is the hash table in 204 of FIG. 2 .
  • hash table entries are never removed/modified. For example, since removing entries in the hash table can be computationally expensive, entries are not removed, and consequently the hash table includes data that is not potentially relevant to race condition detection.
  • the hash table is used to approximate whether appropriate race detection queues should be searched.
  • the global hash table is not used and only the race condition detection queues are used.
  • performing the race detection operation includes modifying (e.g., incrementing) a reference generation identifier that can be used to determine whether a memory operation has been performed after an ordering operation.
  • a reference generation identifier that can be used to determine whether a memory operation has been performed after an ordering operation. For example, identifiers of store operation destination memory addresses are stored in a global hash table together with associated generation numbers. When a store and/or load operation is performed, the hash table can be searched to locate entries associated with a desired memory address and a desired generation number to determine whether the memory operation is likely associated with a race condition.
  • the generation identifier the need for a race condition detection queue associated with each processor can be eliminated.

Abstract

Detecting a race condition is disclosed. An indication of a store operation to a memory address is received. An identifier of the memory address is stored. The identifier is used to detect an occurrence of a memory operation that is not associated with a previous ordering operation.

Description

CROSS REFERENCE TO OTHER APPLICATIONS
This application claims priority to U.S. Provisional Patent Application No. 60/785,798, entitled DETECTING SOFTWARE RACE CONDITIONS WITHIN A CPU SIMULATOR, filed Mar. 23, 2006 which is incorporated herein by reference for all purposes.
BACKGROUND OF THE INVENTION
In a typical computer architecture, parallel processors can enforce strict memory models of in-order execution of stores and loads. However, memory models are becoming weaker as systems with large numbers of memory-coherent processors are becoming common. To prevent a race condition and guarantee that a desired store to memory by one processor in a system is visible to other processors in the system, memory ordering operations such as barrier instructions must be used by a programmer and/or a compiler and/or some other form of code generator. It is easy for programmers and compilers to accidentally omit these memory ordering operations even though a race condition is not desired. This can lead to unpredictable and incorrect program execution. Therefore, there exists a need for a better way to determine whether a desired memory ordering operation has been omitted.
BRIEF DESCRIPTION OF THE DRAWINGS
Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
FIG. 1 is a flowchart illustrating an embodiment of performing a store operation.
FIG. 2 is a flowchart illustrating an embodiment of a process for tracking information associated with a store operation.
FIG. 3 is a flowchart illustrating an embodiment of a process for performing a load operation.
FIG. 4 is a flowchart illustrating an embodiment of a process for detecting a potential race condition.
FIG. 5 is flowchart illustrating an embodiment of a process for performing an ordering operation.
DETAILED DESCRIPTION
The invention can be implemented in numerous ways, including as a process, an apparatus, a system, a composition of matter, a computer readable medium such as a computer readable storage medium or a computer network wherein program instructions are sent over optical or communication links. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. A component such as a processor or a memory described as being configured to perform a task includes both a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. In general, the order of the steps of disclosed processes may be altered within the scope of the invention.
A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
Detecting a memory race condition in a multi-processor environment is disclosed. In some embodiments, at least a portion of the processors are simulated processors. In some embodiments, memory store operations, memory load operations, and/or ordering operations that order memory operations are monitored to detect potential memory race conditions. For example, if a memory location that has been previously stored by a previous store operation is used in a subsequent store and/or load operation without an associated ordering operation, a race condition is detected. In various embodiments, detecting a potential memory race condition includes performing one or more of the following: running the program in a software multi-processor simulator, trapping store and/or load instructions of the program, and replacing store and/or load instructions of the program with other/additional instructions for memory race condition detection. In some embodiments, when a memory store operation of a program is performed, data associated with the store operation is tracked and a check is performed to determine whether the store operation is associated with a potential memory race condition. In some embodiments, when a memory load operation of a program is performed, a check is performed to determine whether the load operation is associated with a potential memory race condition. In some embodiments, when an ordering operation is performed, a race condition detection processing is performed to update/remove tracked information associated with one or more previous store operations. Examples of the ordering operation includes a fence operation, a barrier operation, and a compare and swap operation.
FIG. 1 is a flowchart illustrating an embodiment of performing a store operation. In some embodiments, the process of FIG. 1 is performed when a request for a store operation is received. For example, a processor instruction to store a value to memory is executed and/or compiled. At 102, a store operation is performed. Performing the store operation includes storing a value to a specified memory and/or storage location. In some embodiments, performing the store operation includes performing a simulated store operation using a processor/system simulator. In some embodiments, performing the store operation includes trapping and/or replacing the store operation. At 104, a check is performed to determine whether the store operation is associated with a potential race condition. Checking for the potential race condition includes using information tracked about one or more previous store operations. An example of a detected potential race condition includes detecting a store by a processor to a memory location previously stored to by another processor without performing an associated memory ordering operation. If at 106 it determined a race condition is detected, at 108, the race condition is logged. In some embodiments, logging the race condition includes displaying and/or storing information associated with the detected race condition. For example, a memory location, a processor identifier, and/or a program location/identifier (e.g., a stack location, a program counter, and a function name) is logged to allow a programmer to view, identify, and correct any undesired race conditions. If at 106 it determined a race condition is not detected, at 110, data associated with the store operation is tracked. The tracked data is used in performing a subsequent race condition detection. For example, a memory address, a storage location address, a program location/identifier, and/or a processor identifier are indexed for use in race condition detection.
FIG. 2 is a flowchart illustrating an embodiment of a process for tracking information associated with a store operation. In some embodiments, the process of FIG. 2 is included in 110 of FIG. 1. At 202, an identifier of a destination memory address of the store operation and a identifier of a program location associated with the store operation are stored in a race condition detection queue. Storing the program location is optional. A separate race condition detection queue is associated with each processor of a plurality of associated processors, and the memory address identifier and the program location are stored in the respective queue of the processor performing the store operation. In some embodiments, the processors are simulated processors. In some embodiments, the race detection queue is a circular queue and/or fixed in size to allow efficient storage and searching. The queue is merely an example. In various embodiments, a data structure other than a queue is associated with each processor and the data structure can be used to store the identifiers of the destination address and the program location. In some embodiments, the program location includes one or more of the following: a stack location, a stack trace, a program counter, a function name, and any identifier that can be used identify a location within a program. Other data associated with the store operation can be stored in the queue. In some embodiments, storing data in the race condition detection queue is optional. For example, individual data structures associated with each processor is not used and only a global data structure associated with all of the processors is used to track store operations.
At 204, a memory address identifier and a processor identifier are stored in a global hash table. Storing the processor identifier is optional. The global hash table is accessible by a plurality of processors for tracking store operations across the plurality of processors. In some embodiments, the memory address identifier and the processor identifier are associated together in the hash table. The memory address identifier is stored in the hash table together with an associated generation number. Other data associated with the store instruction can be stored in the hash table. In some embodiments, storing data in the global hash table is optional. For example, only data structures privately associated with each processor is used to track store operations. In some embodiments, the hash table is an unlocked hash table that allows fast accesses. For example, without a global data tracking structure, searching each race condition detection queue of every processor to determine whether a previous store operation has stored to a desired memory location can be computationally expensive. Since the unlocked hash table allows fast searching and entry addition, the hash table can be used to determine whether to search race condition detection queues and/or which race condition detection queues to search.
FIG. 3 is a flowchart illustrating an embodiment of a process for performing a load operation. In some embodiments, the process of FIG. 3 is performed when a request for a load operation is received. At 302, a check is performed to determine whether a potential race condition is associated with the load operation is to be performed. For example, information about previous store operations is searched to determine whether a store operation to the memory address to be loaded has been performed since the last ordering operation by a processor other than the processor performing the load. At 304 if it is determined a race condition has been detected, at 306, the race condition is logged. In some embodiments, logging the race condition includes displaying and/or storing information associated with the detected race condition. For example, a memory location, a processor identifier, and/or a program location is logged to allow a programmer to view, identify, and correct any undesired race conditions. At 306, the load operation is performed. Performing the load operation includes loading a value from memory at a specified memory address. For example, a load processor instruction is performed. In some embodiments, performing the load operation includes performing a simulated load operation. For example, memory is loaded from a simulated memory address of a simulator. In some embodiments, performing the load operation includes trapping and/or replacing the load operation.
FIG. 4 is a flowchart illustrating an embodiment of a process for detecting a potential race condition. In some embodiments, the process of FIG. 4 is included in 104 of FIG. 1. In some embodiments, the process of FIG. 4 is included in 302 of FIG. 3. At 402, an identifier of a memory address associated with a memory operation is looked up in a global hash table. Examples of the memory address include a store address of a memory store operation, and a load address of a memory load operation. The global hash table can be accessed by a plurality of associated processors. In some embodiments, the hash table is the hash table of 204 in FIG. 2. At 404, if it is determined that the memory address identifier is not found in the global hash table, at 414 it is concluded that no race condition is detected. In some embodiments, memory address identifiers in the global hash table indicate memory addresses that have been previously been stored to and consequently can be associated with a potential race condition.
If the memory address identifier is found in the global hash table, at 406 it determined whether a processor identifier stored with the memory address identifier in the hash table is associated with a processor that is not the processor performing the memory operation. If the processor identifier is associated with the processor performing the memory operation, at 414 it is concluded that no race condition is detected. Otherwise, at 408 it is determined whether the memory address identifier is found in a race condition detection buffer of a processor identified using the processor identifier. In some embodiments, the race condition detection buffer is the buffer in 204 of FIG. 2. Finding the memory address identifier in the buffer includes searching entries of the buffer for the memory address identifier. If the memory address identifier is not found, at 414 it is concluded that no race condition is detected. Otherwise, at 410 it is determined whether the memory operation using the memory address is associated with a benign race condition. In some embodiments, one or more predetermined criteria for a benign race condition is specified for one or more program applications. For example, a memory address that is always associated with benign race condition is specified for a program. If a benign race condition is detected, at 414 it is concluded that no race condition is detected. Otherwise, at 412 it concluded a race condition is detected.
In the example of the FIG. 4, both a global hash table and a race detection queue of a processor have been used in determining whether a race condition is detected. In some embodiments, using the race condition detection queue is optional. For example, only the global hash table is searched to determine whether a race condition is detected. In some embodiments, using the global hash table is optional. For example, rather than searching the global hash table, individual race condition detection queues are searched to determine whether a race condition is detected.
FIG. 5 is flowchart illustrating an embodiment of a process for performing an ordering operation. In some embodiments, the process of FIG. 5 is performed when a request for an ordering operation is received. At 502, an operation ordering memory operations is performed. The ordering operation orders memory operations such that one or more store operations occurring before the ordering operation is visible to other processors before any memory operation occurring after the ordering operation. For example, a store fence operation is performed. In some embodiments, performing the ordering operation includes performing a simulated ordering operation in a simulator. In some embodiments, performing the ordering operation includes trapping and/or replacing the ordering operation. At 504, a race condition detection operation associated with the ordering operation is performed. Tracking data that tracks memory addresses modified by a processor is reset and/or updated to reflect the memory ordering operation. For example, entries in a race condition detection buffer of the processor are removed and/or entries in a global hash table associated with the processor are removed. In some embodiments, the buffer is the buffer in 202 of FIG. 2 and the hash table is the hash table in 204 of FIG. 2. In some embodiments, hash table entries are never removed/modified. For example, since removing entries in the hash table can be computationally expensive, entries are not removed, and consequently the hash table includes data that is not potentially relevant to race condition detection. The hash table is used to approximate whether appropriate race detection queues should be searched. In some embodiments, the global hash table is not used and only the race condition detection queues are used.
In some embodiments, performing the race detection operation includes modifying (e.g., incrementing) a reference generation identifier that can be used to determine whether a memory operation has been performed after an ordering operation. For example, identifiers of store operation destination memory addresses are stored in a global hash table together with associated generation numbers. When a store and/or load operation is performed, the hash table can be searched to locate entries associated with a desired memory address and a desired generation number to determine whether the memory operation is likely associated with a race condition. By using the generation identifier, the need for a race condition detection queue associated with each processor can be eliminated.
Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided. There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.

Claims (25)

1. A method of detecting a race condition, comprising:
receiving an indication of a store operation to a memory address;
storing an identifier of the memory address; and
using the identifier to detect an occurrence of a memory operation that is not associated with a previous ordering operation, including using the identifier of the memory address to search a global data structure associated with a plurality of processors; wherein:
a search result of the global data structure can be used to identify a private data structure associated with at least one processor; and
detecting the memory operation includes using the identifier of the memory address to search the private data structure.
2. A method as recited in claim 1, wherein the memory operation includes one or more of the following: a store operation to the memory address, and a load operation from the memory address.
3. A method as recited in claim 1, wherein using the identifier to detect the memory operation occurrence includes determining that an ordering operation has been omitted.
4. A method as recited in claim 1, wherein using the identifier to detect the memory operation occurrence includes performing one or more of the following: trapping the memory operation, replacing the memory operation, and running the memory operation in a simulator.
5. A method as recited in claim 1, wherein the ordering operation includes one or more of the following: a fence operation, a barrier operation, and a compare and swap operation.
6. A method as recited in claim 1, wherein using the identifier to detect the memory operation occurrence includes displaying or logging information of the memory operation.
7. A method as recited in claim 6, wherein the information of the memory operation includes one or more of the following: the memory address, an identifier of a processor performing the memory operation, and an identifier of a location within a program.
8. A method as recited in claim 1, wherein detecting the memory operation occurrence allows a user to view, identify, or correct an undesired race condition caused by the memory operation.
9. A method as recited in claim 1, further comprising associating and storing with the identifier of the memory address one or more of the following: an identifier of a processor associated with the memory operation, a program counter, an identifier of a location within a program, a stack location, a stack trace, and a function name.
10. A method as recited in claim 1, wherein using the identifier to detect the memory operation occurrence includes determining that the memory operation occurrence is associated with a different processor from a processor associated with the store operation.
11. A method as recited in claim 1, wherein the identifier of the memory address includes at least a portion of the memory address.
12. A method as recited in claim 1, wherein the store operation is associated with a first processor, and the using the identifier to detect the memory operation occurrence includes determining whether a store operation of a second processor has stored to the memory address after a latest ordering operation has been performed.
13. A method as recited in claim 1, wherein the store operation is associated with a first processor, and the using the identifier to detect the memory operation occurrence includes determining whether a load operation of a second processor has loaded from the memory address after a latest ordering operation has been performed.
14. A method as recited in claim 1, wherein storing the identifier of the memory address includes storing the identifier in a data structure associated with a single processor.
15. A method as recited in claim 14, wherein the identifier of the memory address is stored in a data structure associated with a plurality of processors.
16. A method as recited in claim 1, wherein storing the identifier of the Memory address includes storing the identifier in a data structure associated with a plurality of processors.
17. A method as recited in claim 16, wherein the data structure includes an unlocked hash table.
18. A method as recited in claim 16, wherein the identifier of the memory address is stored with a generation identifier that can be used to determine whether the memory operation is performed after the ordering operation.
19. A method as recited in claim 1, wherein a search result of the global data structure indicates a memory address that is potentially associated with a race condition.
20. A method as recited in claim 1, wherein using the identifier to detect the memory operation occurrence includes using one or more predetermined criteria to determine the memory operation is not associated with a benign race condition.
21. A method as recited in claim 1, wherein the ordering operation orders memory operations such that a store operation, if any, of a processor occurring before the ordering operation is visible to other processors before any memory operation occurring after the ordering operation.
22. A method as recited in claim 1, wherein performing the ordering operation includes removing the stored identifier of the memory address.
23. A method as recited in claim 1, wherein the performing the ordering operation includes updating a generation reference identifier that can be used to determine whether the memory operation is performed after the ordering operation.
24. A system for detecting a race condition, comprising:
a processor; and
a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to:
receive an indication of a store operation to a memory address, store an identifier of the memory address, and use the identifier to detect an occurrence of a memory operation that is not associated with a previous ordering operation; wherein:
using the identifier to detect the memory operation occurrence includes using the identifier of the memory address to search a global data structure associated with a plurality of processors;
a search result of the global data structure can be used to identify a private data structure associated with at least one processor; and
detecting the memory operation includes using the identifier of the memory address to search the private data structure.
25. A computer program product for detecting a race condition, the computer program product being embodied in a computer readable medium and comprising computer instructions for:
receiving an indication of a store operation to a memory address;
storing an identifier of the memory address; and
using the identifier to detect an occurrence of a memory operation that is not associated with a previous ordering operation, including using the identifier of the memory address to search a global data structure associated with a plurality of processors; wherein:
a search result of the global data structure can be used to identify a private data structure associated with at least one processor; and
detecting the memory operation includes using the identifier of the memory address to search the private data structure.
US11/716,545 2006-03-23 2007-03-08 Detecting software race conditions Active 2029-07-09 US7844862B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/716,545 US7844862B1 (en) 2006-03-23 2007-03-08 Detecting software race conditions
US12/910,761 US8230271B2 (en) 2006-03-23 2010-10-22 Detecting software race conditions

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US78579806P 2006-03-23 2006-03-23
US11/716,545 US7844862B1 (en) 2006-03-23 2007-03-08 Detecting software race conditions

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/910,761 Continuation US8230271B2 (en) 2006-03-23 2010-10-22 Detecting software race conditions

Publications (1)

Publication Number Publication Date
US7844862B1 true US7844862B1 (en) 2010-11-30

Family

ID=43215729

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/716,545 Active 2029-07-09 US7844862B1 (en) 2006-03-23 2007-03-08 Detecting software race conditions
US12/910,761 Active US8230271B2 (en) 2006-03-23 2010-10-22 Detecting software race conditions

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/910,761 Active US8230271B2 (en) 2006-03-23 2010-10-22 Detecting software race conditions

Country Status (1)

Country Link
US (2) US7844862B1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080178156A1 (en) * 2007-01-24 2008-07-24 Nec Laboratories America, Inc. Fast and accurate static data-race detection for concurrent programs
US20090037888A1 (en) * 2007-07-30 2009-02-05 Fujitsu Limited Simulation of program execution to detect problem such as deadlock
US20100287300A1 (en) * 2007-09-20 2010-11-11 Microsoft Corporation Crisscross cancellation protocol
US20110016289A1 (en) * 2009-07-20 2011-01-20 Ableidinger Bruce J Apparatus and Method for Profiling Software Performance on a Processor with Non-Unique Virtual Addresses
US20160291975A1 (en) * 2015-03-30 2016-10-06 Fujitsu Limited Method of compiling program, storage medium, and apparatus

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9842009B2 (en) 2013-05-13 2017-12-12 Nxp Usa, Inc. Method and device for detecting a race condition and a computer program product

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5535365A (en) * 1993-10-22 1996-07-09 Cray Research, Inc. Method and apparatus for locking shared memory locations in multiprocessing systems
US20030236951A1 (en) * 2002-06-25 2003-12-25 International Business Machines Corporation Method and apparatus for efficient and precise datarace detection for multithreaded object-oriented programs
US20040068613A1 (en) * 2002-10-03 2004-04-08 Tierney Gregory E. Retry-based late race resolution mechanism for a computer system
US6738737B1 (en) * 1999-02-18 2004-05-18 Cirrus Logic, Inc. Race condition ordering and functional verification system and method
US20040117564A1 (en) * 2002-12-16 2004-06-17 Oskar Grenholm System and method for reducing shared memory write overhead in multiprocessor systems
US6817009B2 (en) * 2000-11-30 2004-11-09 Hewlett-Packard Development Company, L.P. Method and apparatus for verifying data local to a single thread
US20050038806A1 (en) * 2003-08-12 2005-02-17 Zhiqiang Ma Methods and apparatus for detecting data race conditions in message-based multi-threaded programs
US7028119B2 (en) * 2001-04-04 2006-04-11 Wind River Systems, Inc. Automated tool for detection of potential race condition
US7254687B1 (en) * 2002-12-16 2007-08-07 Cisco Technology, Inc. Memory controller that tracks queue operations to detect race conditions
US7366956B2 (en) * 2004-06-16 2008-04-29 Hewlett-Packard Development Company, L.P. Detecting data races in multithreaded computer programs
US20080244332A1 (en) * 2007-03-30 2008-10-02 Microsoft Corporation Machine instruction level race condition detection
US7620852B2 (en) * 2005-03-02 2009-11-17 Microsoft Corporation Systems and methods of reporting multiple threads involved in a potential data race

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5950228A (en) * 1997-02-03 1999-09-07 Digital Equipment Corporation Variable-grained memory sharing for clusters of symmetric multi-processors using private and shared state tables
US7356653B2 (en) * 2005-06-03 2008-04-08 International Business Machines Corporation Reader-initiated shared memory synchronization
US7523260B2 (en) * 2005-12-22 2009-04-21 International Business Machines Corporation Propagating data using mirrored lock caches
US7752605B2 (en) * 2006-04-12 2010-07-06 Microsoft Corporation Precise data-race detection using locksets

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5535365A (en) * 1993-10-22 1996-07-09 Cray Research, Inc. Method and apparatus for locking shared memory locations in multiprocessing systems
US6738737B1 (en) * 1999-02-18 2004-05-18 Cirrus Logic, Inc. Race condition ordering and functional verification system and method
US6817009B2 (en) * 2000-11-30 2004-11-09 Hewlett-Packard Development Company, L.P. Method and apparatus for verifying data local to a single thread
US7028119B2 (en) * 2001-04-04 2006-04-11 Wind River Systems, Inc. Automated tool for detection of potential race condition
US20030236951A1 (en) * 2002-06-25 2003-12-25 International Business Machines Corporation Method and apparatus for efficient and precise datarace detection for multithreaded object-oriented programs
US20040068613A1 (en) * 2002-10-03 2004-04-08 Tierney Gregory E. Retry-based late race resolution mechanism for a computer system
US20040117564A1 (en) * 2002-12-16 2004-06-17 Oskar Grenholm System and method for reducing shared memory write overhead in multiprocessor systems
US7254687B1 (en) * 2002-12-16 2007-08-07 Cisco Technology, Inc. Memory controller that tracks queue operations to detect race conditions
US20050038806A1 (en) * 2003-08-12 2005-02-17 Zhiqiang Ma Methods and apparatus for detecting data race conditions in message-based multi-threaded programs
US7366956B2 (en) * 2004-06-16 2008-04-29 Hewlett-Packard Development Company, L.P. Detecting data races in multithreaded computer programs
US7620852B2 (en) * 2005-03-02 2009-11-17 Microsoft Corporation Systems and methods of reporting multiple threads involved in a potential data race
US20080244332A1 (en) * 2007-03-30 2008-10-02 Microsoft Corporation Machine instruction level race condition detection

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8185875B2 (en) * 2007-01-24 2012-05-22 Nec Laboratories America, Inc. Fast and accurate static data-race detection for concurrent programs
US20080178156A1 (en) * 2007-01-24 2008-07-24 Nec Laboratories America, Inc. Fast and accurate static data-race detection for concurrent programs
US20090037888A1 (en) * 2007-07-30 2009-02-05 Fujitsu Limited Simulation of program execution to detect problem such as deadlock
US9015349B2 (en) 2007-09-20 2015-04-21 Microsoft Technology Licensing, Llc Crisscross cancellation protocol
US20100287299A1 (en) * 2007-09-20 2010-11-11 Microsoft Corporation Crisscross cancellation protocol
US8327030B2 (en) 2007-09-20 2012-12-04 Microsoft Corporation Crisscross cancellation protocol
US8346973B2 (en) * 2007-09-20 2013-01-01 Microsoft Corporation Crisscross cancellation protocol
US20100287300A1 (en) * 2007-09-20 2010-11-11 Microsoft Corporation Crisscross cancellation protocol
US9219673B2 (en) 2007-09-20 2015-12-22 Microsoft Technology Licensing, Llc Crisscross cancellation protocol
US9686320B2 (en) 2007-09-20 2017-06-20 Microsoft Technology Licensing, Llc Crisscross cancellation protocol
US20110016289A1 (en) * 2009-07-20 2011-01-20 Ableidinger Bruce J Apparatus and Method for Profiling Software Performance on a Processor with Non-Unique Virtual Addresses
US8185717B2 (en) * 2009-07-20 2012-05-22 Mips Technologies, Inc. Apparatus and method for profiling software performance on a processor with non-unique virtual addresses
US20160291975A1 (en) * 2015-03-30 2016-10-06 Fujitsu Limited Method of compiling program, storage medium, and apparatus

Also Published As

Publication number Publication date
US8230271B2 (en) 2012-07-24
US20110041015A1 (en) 2011-02-17

Similar Documents

Publication Publication Date Title
US8230271B2 (en) Detecting software race conditions
US10379989B2 (en) Processing apparatus, trace unit and diagnostic apparatus
US8843944B2 (en) Accelerated class check
US8359496B1 (en) Fault-resistant just-in-time compiler
US9298910B2 (en) System and method for virtual partition monitoring
US9389973B2 (en) Memory error propagation for faster error recovery
US9535613B2 (en) Hardware and software methodologies for detecting illegal memory address of a memory access operation
KR20160099672A (en) Detection of unauthorized memory modification and access using transactional memory
US20110320745A1 (en) Data-scoped dynamic data race detection
US8799716B2 (en) Heap dump occurrence detection
US20140075120A1 (en) Cache line history tracking using an instruction address register file
US9244688B2 (en) Branch target buffer preload table
US20130145216A1 (en) Systems and methods for hardware-assisted type checking
US20120089973A1 (en) Smart patch delivery system
CN104750459A (en) Processor With Transactional Capability and Logging Circuitry To Report Transactional Operations
CN104715202A (en) Hidden process detecting method and hidden process detecting device in virtual machine
US20130185536A1 (en) Hash-based managing of storage identifiers
US8135690B2 (en) Concurrency object classification
US9971670B2 (en) Detecting uninitialized memory references
Albert et al. Actor-and task-selection strategies for pruning redundant state-exploration in testing
US9268599B2 (en) Recording and profiling transaction failure addresses of the abort-causing and approximate abort-causing data and instructions in hardware transactional memories
US20160266995A1 (en) Detecting uninitialized memory references
US7103880B1 (en) Floating-point data speculation across a procedure call using an advanced load address table
US20160239403A1 (en) An apparatus and method for controlling debugging of program instructions including a transaction
US9619345B2 (en) Apparatus for determining failure context in hardware transactional memories

Legal Events

Date Code Title Description
AS Assignment

Owner name: AZUL SYSTEMS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GROVE, DANIEL DWIGHT;POSVA, IVAN;CHOQUETTE, JACK H.;AND OTHERS;SIGNING DATES FROM 20070508 TO 20070515;REEL/FRAME:019334/0402

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: SILICON VALLEY BANK, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:AZUL SYSTEMS, INC.;REEL/FRAME:037641/0665

Effective date: 20151203

AS Assignment

Owner name: PARTNERS FOR GROWTH IV, L.P., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:AZUL SYSTEMS, INC.;REEL/FRAME:037959/0694

Effective date: 20160229

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552)

Year of fee payment: 8

AS Assignment

Owner name: AZUL SYSTEMS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PARTNERS FOR GROWTH IV, L.P.;REEL/FRAME:048411/0138

Effective date: 20190221

AS Assignment

Owner name: GOLUB CAPITAL LLC, AS COLLATERAL AGENT, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNOR:AZUL SYSTEMS, INC.;REEL/FRAME:052293/0121

Effective date: 20200401

Owner name: AZUL SYSTEMS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:052293/0869

Effective date: 20200401

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12